A recommended admin password reset mechanism for BEA WebLogic Server 8.1, when followed before October 10, 2005, causes the administrator password to be stored in cleartext in the domain directory, which could allow attackers to gain privileges.
                
            References
                    Configurations
                    History
                    21 Nov 2024, 00:11
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () http://dev2dev.bea.com/pub/advisory/193 - Patch, Vendor Advisory | |
| References | () http://secunia.com/advisories/20130 - Vendor Advisory | |
| References | () http://securitytracker.com/id?1016101 - | |
| References | () http://www.vupen.com/english/advisories/2006/1828 - | |
| References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/26460 - | 
Information
                Published : 2006-05-23 10:06
Updated : 2025-04-03 01:03
NVD link : CVE-2006-2546
Mitre link : CVE-2006-2546
CVE.ORG link : CVE-2006-2546
JSON object : View
Products Affected
                bea
- weblogic_server
CWE
                